Movatterモバイル変換


[0]ホーム

URL:


US7167084B2 - Temporary key invalidation for electronic key and locking system - Google Patents

Temporary key invalidation for electronic key and locking system
Download PDF

Info

Publication number
US7167084B2
US7167084B2US11/054,570US5457005AUS7167084B2US 7167084 B2US7167084 B2US 7167084B2US 5457005 AUS5457005 AUS 5457005AUS 7167084 B2US7167084 B2US 7167084B2
Authority
US
United States
Prior art keywords
keys
behind
vehicle
command
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US11/054,570
Other versions
US20060186988A1 (en
Inventor
David T. Proefke
Thomas E. Utter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motors Liquidation Co
GM Global Technology Operations LLC
Original Assignee
General Motors Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/054,570priorityCriticalpatent/US7167084B2/en
Application filed by General Motors CorpfiledCriticalGeneral Motors Corp
Assigned to GENERAL MOTORS CORPORATIONreassignmentGENERAL MOTORS CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PROEFKE, DAVID T., UTTER, THOMAS E.
Publication of US20060186988A1publicationCriticalpatent/US20060186988A1/en
Application grantedgrantedCritical
Publication of US7167084B2publicationCriticalpatent/US7167084B2/en
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS, INC.reassignmentGM GLOBAL TECHNOLOGY OPERATIONS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GENERAL MOTORS CORPORATION
Assigned to UNITED STATES DEPARTMENT OF THE TREASURYreassignmentUNITED STATES DEPARTMENT OF THE TREASURYSECURITY AGREEMENTAssignors: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
Assigned to CITICORP USA, INC. AS AGENT FOR BANK PRIORITY SECURED PARTIES, CITICORP USA, INC. AS AGENT FOR HEDGE PRIORITY SECURED PARTIESreassignmentCITICORP USA, INC. AS AGENT FOR BANK PRIORITY SECURED PARTIESSECURITY AGREEMENTAssignors: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS, INC.reassignmentGM GLOBAL TECHNOLOGY OPERATIONS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: UNITED STATES DEPARTMENT OF THE TREASURY
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS, INC.reassignmentGM GLOBAL TECHNOLOGY OPERATIONS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: CITICORP USA, INC. AS AGENT FOR BANK PRIORITY SECURED PARTIES, CITICORP USA, INC. AS AGENT FOR HEDGE PRIORITY SECURED PARTIES
Assigned to UNITED STATES DEPARTMENT OF THE TREASURYreassignmentUNITED STATES DEPARTMENT OF THE TREASURYSECURITY AGREEMENTAssignors: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
Assigned to UAW RETIREE MEDICAL BENEFITS TRUSTreassignmentUAW RETIREE MEDICAL BENEFITS TRUSTSECURITY AGREEMENTAssignors: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS, INC.reassignmentGM GLOBAL TECHNOLOGY OPERATIONS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: UAW RETIREE MEDICAL BENEFITS TRUST
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS, INC.reassignmentGM GLOBAL TECHNOLOGY OPERATIONS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: UNITED STATES DEPARTMENT OF THE TREASURY
Assigned to WILMINGTON TRUST COMPANYreassignmentWILMINGTON TRUST COMPANYSECURITY AGREEMENTAssignors: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
Assigned to GM Global Technology Operations LLCreassignmentGM Global Technology Operations LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
Assigned to GM Global Technology Operations LLCreassignmentGM Global Technology Operations LLCRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: WILMINGTON TRUST COMPANY
Adjusted expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and apparatus are provided for rendering electronic keys left behind in a vehicle temporarily inactive. The apparatus comprises a vehicle security control module in wireless communication with the electronic keys, and having operatively coupled together a receiver, a processor, non-volatile memory and a short-range transmitter. When the module receives a valid lock command from any source it sends a short-range interrogation signal to keys within the vehicle. Left-behind keys respond and send their unique ID(s) to the module's receiver. The processor obtains the unique ID(s) from the receiver and sets one or more inhibit flags in memory or equivalent to identify those keys as left-behind keys. The processor thereafter ignores commands from such left-behind keys, thereby rendering them temporarily inoperative until a valid unlock command is received form another source, whereupon the processor clears the inhibit flags from memory and restores the left-behind keys to active status.

Description

TECHNICAL FIELD
The present invention generally relates to electronic locking systems and keys therefore, and more particularly relates to means and methods for rendering electronic keys for such systems temporarily valid or invalid.
BACKGROUND
There are many applications today where electronic keys are used. A common example is with vehicles where an electronic key, sometimes in the form of a “fob” is enabled by the user to lock and unlock the vehicle doors, trunk, etc., raise and lower windows, start and stop the engine and/or perform a variety of other functions. Such systems are well known in the art.
The present invention is described for the case of electronic keys used to authorize vehicle door access, trunk access, and starting, but this is merely for convenience of explanation and not intended to be limiting. Persons of skill in the art will understand based on the description herein that the present invention applies to any electronic key function and not merely to a “lock” and “unlock” function and not merely to vehicles. Hence, such other electronic key functions are intended to be included in the words “lock” and “unlock” and such other locations, equipment, structures and/or apparatus are intended to be included in the word “vehicle.”
While prior art electronic keys and key systems are useful, they suffer from a number of limitations, well known in the art. Among these limitations is the presence of multiple keys. For example, when multiple keys exist and one or more is left behind in the vehicle (or structure), security can be compromised if an unauthorized person gains access to the “left-behind” key. Even if the vehicle is locked if there is an unauthorized entry and the intruder gains access to the left-behind key, he or she may be able to open doors, turn off a security alarm, start the vehicle or otherwise perform those functions able to be controlled by the left-behind key. Thus, a need continues to exist for improved systems and methods for dealing with multiple keys so that left-behind or other temporarily un-needed keys do not represent a security risk.
Accordingly, it is desirable to provide an improved electronic locking and key system and method that mitigate the risk presented by left-behind keys or other keys whose use may be compromised. It is desirable that the system be able to temporarily invalidate electronic keys that are left-behind or that otherwise present a security risk. In addition, it is desirable that the improved system and method be generally compatible with prior art electronic key systems. Furthermore, other desirable features and characteristics of the present invention will become apparent from the subsequent detailed description and the appended claims, taken in conjunction with the accompanying drawings and the foregoing technical field and background.
BRIEF SUMMARY
An apparatus is provided for rendering electronic keys left behind in a vehicle temporarily inoperative. The apparatus comprises a vehicle security control module in wireless communication with the electronic keys and having a receiver adapted to receive commands from electronic keys, a processor, non-volatile memory and a short range transmitter, operatively coupled together. When the security module receives a valid LOCK command from any source it sends a short-range interrogation signal to any keys within the vehicle. Such left-behind keys respond and send their unique ID(s) to the module's receiver. The processor obtains the unique ID(s) from the receiver and sets one or more inhibit flags in memory to identify those as left-behind keys. The processor thereafter ignores commands or signals from such left-behind keys, thereby rendering them temporarily inactive. Such left-behind keys remain inactive until a valid UNLOCK command is received form another source, whereupon the processor clears the inhibit flags from memory and restores the left-behind keys to active status.
A method is provided for rendering electronic keys left behind in a vehicle temporarily inoperative. The method comprises receiving a LOCK command, sending a short range interrogation signal from the vehicle security control module to any keys left behind in the vehicle, receiving from any left-behind key(s) their unique ID(s), and setting one or more inhibit flags for the unique ID(s) of the left-behind keys, wherein the inhibit flags cause the vehicle to temporarily ignore further commands or signals received from such left-behind key(s). The left-behind keys remain invalidated until an UNLOCK command is received from other than an invalidated key and the one or more inhibit flags are cleared, thereby returning the left-behind keys to operating status.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will hereinafter be described in conjunction with the following drawing figures, wherein like numerals denote like elements, and
FIG. 1 is a simplified electrical block diagram of the system of the present invention; and
FIG. 2 is a simplified flow chart of the method of the present invention.
DETAILED DESCRIPTION
The following detailed description is merely exemplary in nature and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding technical field, background, brief summary or the following detailed description.
FIG. 1 is a simplified electrical block diagram ofsystem20 of the present invention, comprisingsecurity control module41 in the vehicle (or structure) and one or more portableelectronic keys21 that may or may not be in the vehicle (or structure).Keys21 compriseprocessor22,non-volatile memory24,other memory25,transmitter26 andreceiver28, operatively coupled by bus or leads23. A state machine or other device may also be used as a replacement forprocessor22 and as used herein the word “processor” is intended to include such alternative.Antenna27 is provided fortransmitter26 andantenna29 is provided forreceiver28.Keys21 communicate with vehiclesecurity control module41 viasignals33,35 from and toantennas27,29 respectively.Transmitter26 ofkey21 andreceiver46 ofsecurity control module41 operate preferably at radio frequencies (RF). Thus,signal33 is preferably an RF signal. Receiver28 ofkey21 andtransmitter48 ofvehicle security module41 operate preferably at low frequencies (LF). Thus,signal35 is preferably a LF signal. However, the use of RF and LF signals is not essential. Other frequencies may also be used, provided thatsignal35 is limited in range, as will be explained in more detail later. Non-limiting examples of suitable frequencies are 300 to 500 MHz forsignal33 and 100 to 150 KHz forsignal35, but this is not intended to be limiting. Optical signals may also be used. For example, low power infrared may also be used forsignal35.
Vehicle mountedsecurity control module41 comprisesprocessor42,non-volatile memory44, other memory45,receiver46,transmitter48 and actuator(s)50, operatively coupled by leads orbus43.Antenna47 is provided forreceiver46, which receivessignals33 fromantenna27 andtransmitter26 ofkey21. Antenna(s)49 are provided fortransmitter48, which sendssignals35 toantenna29 ofreceiver28 ofkey21. Further LOCK/UNLOCK request sources51 are coupled tocontrol module41 by leads orbus52 and/or bywireless signal53. Non-limiting examples of further LOCK/UNLOCK request sources51 are central door lock switches, passive door lock switches, telematic services, key activated lock cylinders, alarm system activation/de-activation switches, and so forth.
In one manner of ordinary operation, activation of function buttons (not shown) onelectronic key21 by the user causesprocessor22 ofkey21 to retrieve the appropriate command code (e.g., LOCK, UNLOCK, etc.) and the key identification code (unique key ID) fromnon-volatile memory24. Persons of skill in the art will understand that a variety of operator selected functions may be included inkey21.Processor22 prepares a signal containing these codes in the appropriate format and passes it over bus or leads23 totransmitter26 where it is modulated onto an appropriate (e.g., RF) carrier bytransmitter26 and sent assignal33 viaantenna27 toantenna47 andreceiver46 ofcontrol module41. Receiver46demodulates signal33 and passes the recovered command and identification codes over bus or leads43 toprocessor42.Processor42 compares the received key ID code with valid key ID codes stored inmemory44 and, if approved, causes actuator(s)50 to execute the command received fromkey21. Thus, among other things,processor42 in cooperation withmemory44,45 andreceiver46, checks any signals received fromkey21 to insure that the ID of the transmitting key corresponds to a key authorized to issue commands to the particular vehicle.
Consider the situation where severalvalid keys21 exist, that is, more than one key is authorized to control vehicle functions viasecurity control module41. The user may take only one key with him/her when he or she exists the vehicle. One or more of the other keys are left behind in the vehicle. The portable key(s) are not the only mechanisms or circumstances able to lock or unlock the vehicle. In general, other lock/unlock request sources50 are often coupled to the vehicle. For example, and not intended to be limiting, the vehicle may be locked or unlocked by:
  • a) Activation of a central locking request from the vehicle interior;
  • b) Transmission of a “lock” command from nearby portable device such askey fob21;c)
  • c) Transmission of a “lock” command from a remote service provider (e.g., one of several lock/unlock request sources50);
  • d) Activation of a central locking request from a vehicle mounted exterior switch (e.g., another of several lock/unlock request sources50); and/or
  • e) Passive locking upon detection of a reduction in electronic keys present in the vehicle's interior.
    It is desirable that the left-behind key or keys be rendered temporarily inactive so as to not constitute a potential security risk to the vehicle. This is accomplished by the present invention
When any lock activation, such as those listed above, is requested or occurs when the vehicle is in an OFF mode of operation, vehicle mountedsecurity control module41 determines whether anyelectronic keys21 have been left in the vehicle. Alternatively, the vehicle alarm system status (e.g., one of sources50) may be used as a surrogate for a lock and/or unlock commands, i.e., an ALARM ON command or status is equivalent to a LOCK command. Determining whether any keys remaining the vehicle is conveniently accomplished byprocessor42 causingtransmitter48 to sendinterrogation signal35 tokeys21 within range, that is, still within the vehicle. Havingtransmitter48 be a low frequency (LF) transmitter limits the range oftransmitter48 so thatonly keys21 that are still within the vehicle receiveinterrogation signal35. When a key receives such an interrogation signal, it responds acknowledging its continuing presence in the vehicle and giving its unique ID. Depending upon the vehicle configuration, it may be advantageous to useseveral antennas49 to provide interior vehicle coverage while still having negligible transmission field outside the vehicle. Whencontrol module41 receives a response or acknowledgement signal fromkey transmitter26 containing the unique ID of that key, it knows that such key has been left behind in the vehicle. For each key21 that has been left in the vehicle,processor42 causes an inhibit flag or other marker to be set inmemory44 to identify the left-behind key as temporarily invalid. Flag storage is performed innon-volatile memory44 to ensure proper security is maintained over time and voltage levels.
As long as this inhibit flag remains set, the vehicle will not respond to commands from that portable key. For each normal access or vehicle operation request where anyelectronic key21 is detected and has passed the normal ID and/or other authentication process, a further check is made of its flag to determine if it is temporarily invalid. If the inhibit flag or other marker is set indicating that the key is invalid, no vehicle action will result. If the inhibit flag or other marker is not set, the corresponding function will be appropriately performed. In the preferred embodiment, upon receipt of an authenticated unlock request from any electronic key21 that has been deemed to be also a valid key (ID match; no flag set, etc.) or from any other allowed unlock request source, the inhibit flags for all other electronic keys programmed to the vehicle will be cleared, thereby re-validating them all for subsequent use. The operation ofsystem20 will be more fully understood by reference to the method of the present invention illustrated inFIG. 2.
FIG. 2 is a simplified flow chart ofmethod100 of the present invention.Method100 begins withSTART102 and initial COMMAND RECEIVED FROM KEY?query104.START102 provides for initialization ofsystem20 in the key inhibit mode and desirably occurs when the ignition is switched off or the vehicle otherwise placed in the OFF state. Ininitial query104 it is determined whether or not the vehicle has received a command from one ofkeys21. If the outcome ofquery104 is FALSE (NO), abbreviated “N”, thenmethod100 advances to VALID LOCK COMMAND FROM VEHICLE? query106 wherein it is determined whether or not a valid lock command has been received from the vehicle, e.g., from one of other lock request sources51. If the outcome ofquery106 is FALSE (NO) then, as shown bypath107,method100 loops back toSTART102 andinitial step104. If the outcome ofquery104 is TRUE (YES), abbreviated as “Y”, thenmethod100 proceeds to KEY'S INHIBIT FLAG SET? query108 wherein it is determined whether the key issuing the command referred to instep104 has its inhibit flag set, to inactivate such key. If the outcome ofquery108 is TRUE (YES), then as shown bypath109,method100 loops back toSTART102 andinitial query104. This has the effect of ignoring commands received from a key whose inhibit flag is set while preparing to accept a valid command that originates other than from suchportable key21.
If the outcome ofquery108 is FALSE (NO) meaning that the command issuing key is not inhibited,method100 proceeds to RECEIVED COMMAND=LOCK? query110 wherein it is determined whether the received command is a LOCK command. If the outcome ofquery110 is TRUE (YES), thenmethod100 advances to SEND QUERY TOINSIDE KEYS step112, whereinsecurity control module41 sends localized interrogation orquery signal35 to one ormore keys21 that are within the vehicle. Those ofkeys21 that are within the vehicle respond at least with their unique IDs.Module41 then executes ANY KEYS LEFT BEHIND? query120 to determine which, if any, ofkeys21 have been left behind in the vehicle. Returning to query106, if the outcome ofquery106 is TRUE (YES) indicating thatsecurity module41 has received a valid LOCK command from a key21 or anotherlock request source51, thenmethod100 also advances to interrogatestep112 andquery120. Thus, if a LOCK command or request is received from eitherkeys21 or from anothersource51,method100 will determine whether any other ofkeys21 have been left behind in the vehicle, and through their unique IDs, which ofkeys21 have been left behind in the vehicle. If the outcome of ANY KEYS LEFT BEHIND? query120 is TRUE (YES),method100 advances to INHIBIT LEFT-BEHIND KEYS step122 wherein the keys identified insteps112,120 have their inhibit flags set so that they are no longer functional in whole or in part. Afterstep122,method100 advances to EXECUTECOMMAND step116. If the outcome of ANY KEYS LEFT BEHIND? query120 is FALSE (NO), thenmethod100 proceeds to EXECUTECOMMAND step116 wherein the received and authenticated command is executed.
Returning now to query110, if the outcome ofquery110 is FLASE (NO) indicating that the received command was not a LOCK command, thenmethod100 proceeds to RECEIVED COMMAND=UNLOCK? query114 wherein it is determined whether the received command is an UNLOCK command. If the outcome ofquery114 is FALSE (NO), thenmethod100 also proceeds to EXECUTECOMMAND step116. (This deals with the circumstance where the received command is neither a LOCK nor UNLOCK command.) If the outcome ofquery114 is TRUE (YES) indicating that the received command is an UNLOCK command, thenmethod100 proceeds to CLEAR INHIBIT(S)step118, wherein any inhibit flags previously set are cleared, thereby returning the corresponding key(s) to active status. Followingstep118,method100 proceeds to EXECUTECOMMAND step116 and thereafter loops back toSTART102 as shown bypath117.
In summary, a LOCK command causescontrol module41 to interrogate those ofkeys21 that may have been left behind in the vehicle and inhibits them from performing all or some of their normal functions until a valid UNLOCK command has been received from another source. The inhibit is conveniently accomplished by placing a flag or other marker in non-volatile memory incontrol module41, but any other means of accomplishing an equivalent inhibit result may also be used. A non-limiting example of an alternate arrangement is to send an inhibit command back to the inside-the-vehiclekeys using signal35 and storing the inhibit flag inmemory24 within the inhibited keys themselves. With this arrangement, each key would check its own inhibit flag before sending a command tomodule41 and if the flag is set, not transmit tomodule41 until its inhibit status is cleared. The same result is accomplished in that inhibited keys are inactivated untilmodule41 sends outsignal35 containing a CLEAR INHIBITS command to affectedkeys21.
While at least one exemplary embodiment has been presented in the foregoing detailed description, it should be appreciated that a vast number of variations exist. For example, inhibiting the left-behind keys by setting a flag in memory is but one of many ways in which the left behind keys may be rendered temporarily inactive. Accordingly, the words “setting a flag in memory” and “storing one or more inhibit flags” or equivalent are intended to include such alternative arrangements for temporarily invalidating the left-behind keys. It should also be appreciated that the exemplary embodiment or exemplary embodiments are only examples, and are not intended to limit the scope, applicability, or configuration of the invention in any way. Rather, the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing the exemplary embodiment or exemplary embodiments. It should be understood that various changes can be made in the function and arrangement of elements without departing from the scope of the invention as set forth in the appended claims and the legal equivalents thereof.

Claims (14)

1. A system for inhibiting electronic vehicle keys left behind in the vehicle when the vehicle doors are locked, comprising:
one or more portable keys adapted to send wireless command signals;
a vehicle security control module adapted to receive the wireless command signals from the one or more portable keys, wherein upon receiving a lock command signal, the vehicle security control module is configured to broadcast a short-range interrogation signal adapted to reach substantially only those of the one or more portable keys remaining within the vehicle, to receive a response containing a unique ID from those of the keys remaining within the vehicle thereby identifying themselves as left-behind keys, to store one or more inhibit flags identifying such left-behind keys as no longer valid and thereafter to ignore commands from such left-behind keys.
14. An apparatus for inhibiting those vehicle electronic keys left behind in the vehicle when its doors are locked, comprising:
a vehicle security control module adapted to receive lock/unlock command signals from multiple sources;
one or more portable keys adapted to send command signals to the security control module and containing memory;
wherein upon receiving a lock command signal, the vehicle security control module broadcasts a short-range signal adapted to reach substantially only those of the keys remaining within the vehicle;
wherein in response to the short range signal, those keys remaining within the vehicle store an inhibit signal in their memory identifying themselves as no longer being valid keys, which thereafter until cleared, causes such keys to not send a valid command to the security control module.
US11/054,5702005-02-092005-02-09Temporary key invalidation for electronic key and locking systemExpired - LifetimeUS7167084B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/054,570US7167084B2 (en)2005-02-092005-02-09Temporary key invalidation for electronic key and locking system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/054,570US7167084B2 (en)2005-02-092005-02-09Temporary key invalidation for electronic key and locking system

Publications (2)

Publication NumberPublication Date
US20060186988A1 US20060186988A1 (en)2006-08-24
US7167084B2true US7167084B2 (en)2007-01-23

Family

ID=36912060

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US11/054,570Expired - LifetimeUS7167084B2 (en)2005-02-092005-02-09Temporary key invalidation for electronic key and locking system

Country Status (1)

CountryLink
US (1)US7167084B2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060276186A1 (en)*2005-06-062006-12-07Mitsubishi Denki Kabushiki KaishaElectronic key apparatus for vehicle
US20060273886A1 (en)*2005-06-062006-12-07Mitsubishi Denki Kabushiki KaishaElectronic key apparatus for vehicle
US20080211625A1 (en)*2007-03-012008-09-04Continental Automotive FranceMethod for temporarily inhibiting, when it has been detected inside a locked vehicle, a portable remote control unit known as a tag belonging to a keyless entry device
US20080258553A1 (en)*2007-04-232008-10-23Lear CorporationRemote control reactivation
US8620490B2 (en)2011-04-252013-12-31Honda Motor Co., Ltd.Method to disable trunk lockout protection for smart entry
US9373201B2 (en)2012-05-232016-06-21Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
US9499128B2 (en)2013-03-142016-11-22The Crawford Group, Inc.Mobile device-enhanced user selection of specific rental vehicles for a rental vehicle reservation
US10515489B2 (en)2012-05-232019-12-24Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
CN111572495A (en)*2020-05-192020-08-25上海银基信息安全技术股份有限公司 A vehicle control method, device, equipment, medium and vehicle

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2955069A1 (en)*2010-04-292011-07-15Continental Automotive FranceMotor vehicle's opening frame locking or unlocking method, involves automatic triggering of unlocking of opening frame of motor vehicle in case of localization of badge having stored identification reference, inside motor vehicle
GB2494398B (en)*2011-09-052015-03-11Jaguar Land Rover LtdSecurity system and device therefor
JP5689865B2 (en)*2012-11-292015-03-25株式会社東海理化電機製作所 Control device
CN104183033A (en)*2014-07-212014-12-03潘世杰Automotive remote monitoring device and remote monitoring method thereof
DE102014224080A1 (en)*2014-11-262016-06-02Robert Bosch Gmbh Method for controlling access to a vehicle
JP6347283B2 (en)*2016-10-122018-06-27マツダ株式会社 Electronic key system
US10853474B2 (en)*2017-07-312020-12-01Dell Products, L.P.System shipment lock
US20200079322A1 (en)*2018-09-062020-03-12GM Global Technology Operations LLCUser activated/deactivated key fob
CN112600722A (en)*2020-11-062021-04-02黑龙江惠达科技发展有限公司Automatic testing method for locking function of agricultural machine
US11919476B1 (en)*2022-09-302024-03-05Ford Global Technologies, LlcVehicle key fob management

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5337588A (en)*1990-10-111994-08-16Intellikey CorporationElectronic lock and key system
US5831520A (en)*1998-01-141998-11-03Ford Motor CompanyAnti-lockout smart key system
US20040054934A1 (en)*2002-07-042004-03-18Ulrich EmmerlingMethod for authenticating a first object to at least one further object, especially the vehicle to at least one key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5337588A (en)*1990-10-111994-08-16Intellikey CorporationElectronic lock and key system
US5831520A (en)*1998-01-141998-11-03Ford Motor CompanyAnti-lockout smart key system
US20040054934A1 (en)*2002-07-042004-03-18Ulrich EmmerlingMethod for authenticating a first object to at least one further object, especially the vehicle to at least one key

Cited By (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060276186A1 (en)*2005-06-062006-12-07Mitsubishi Denki Kabushiki KaishaElectronic key apparatus for vehicle
US20060273886A1 (en)*2005-06-062006-12-07Mitsubishi Denki Kabushiki KaishaElectronic key apparatus for vehicle
US7813773B2 (en)*2005-06-062010-10-12Mitsubishi Denki Kabushiki KaishaElectronic key apparatus for vehicle
US20080211625A1 (en)*2007-03-012008-09-04Continental Automotive FranceMethod for temporarily inhibiting, when it has been detected inside a locked vehicle, a portable remote control unit known as a tag belonging to a keyless entry device
US20080258553A1 (en)*2007-04-232008-10-23Lear CorporationRemote control reactivation
US7850078B2 (en)2007-04-232010-12-14Lear CorporationRemote control reactivation
US8620490B2 (en)2011-04-252013-12-31Honda Motor Co., Ltd.Method to disable trunk lockout protection for smart entry
US9710975B2 (en)2012-05-232017-07-18Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
US10515489B2 (en)2012-05-232019-12-24Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
US11694481B2 (en)2012-05-232023-07-04Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
US9373201B2 (en)2012-05-232016-06-21Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
US11037375B2 (en)2012-05-232021-06-15Enterprise Holdings, Inc.Rental/car-share vehicle access and management system and method
US10549721B2 (en)2013-03-142020-02-04The Crawford Group, Inc.Mobile device-enhanced rental vehicle returns
US10308219B2 (en)2013-03-142019-06-04The Crawford Group, Inc.Smart key emulation for vehicles
US9499128B2 (en)2013-03-142016-11-22The Crawford Group, Inc.Mobile device-enhanced user selection of specific rental vehicles for a rental vehicle reservation
US10850705B2 (en)2013-03-142020-12-01The Crawford Group, Inc.Smart key emulation for vehicles
US10899315B2 (en)2013-03-142021-01-26The Crawford Group, Inc.Mobile device-enhanced user selection of specific rental vehicles for a rental vehicle reservation
US10059304B2 (en)2013-03-142018-08-28Enterprise Holdings, Inc.Method and apparatus for driver's license analysis to support rental vehicle transactions
US9701281B2 (en)2013-03-142017-07-11The Crawford Group, Inc.Smart key emulation for vehicles
US11697393B2 (en)2013-03-142023-07-11The Crawford Group, Inc.Mobile device-enhanced rental vehicle returns
US11833997B2 (en)2013-03-142023-12-05The Crawford Group, Inc.Mobile device-enhanced pickups for rental vehicle transactions
US12370976B2 (en)2013-03-142025-07-29The Crawford Group, Inc.Mobile device-enhanced rental vehicle transactions
CN111572495A (en)*2020-05-192020-08-25上海银基信息安全技术股份有限公司 A vehicle control method, device, equipment, medium and vehicle

Also Published As

Publication numberPublication date
US20060186988A1 (en)2006-08-24

Similar Documents

PublicationPublication DateTitle
US7167084B2 (en)Temporary key invalidation for electronic key and locking system
KR101771376B1 (en)Vehicle control system to prevent relay attack
JP6447610B2 (en) Vehicle control system and vehicle control device
US8089342B2 (en)Electronic key system and method
US6906612B2 (en)System and method for vehicle passive entry having inside/outside detection
US7944340B1 (en)System and method for two-way remote activation with adaptive protocol
US9786110B2 (en)On-vehicle apparatus control system and on-vehicle control device
US9965912B2 (en)On-vehicle apparatus control system, on-vehicle control device, and portable machine
KR20190020908A (en)System and method for vehicle control
JP2016171486A (en)Vehicle radio communication system, vehicle controller, and portable apparatus
WO2017017877A1 (en)Vehicle control system
US8847730B2 (en)Vehicular keyless entry system and portable device therefor
US11151814B2 (en)Anti-theft protection for a vehicle
JP2016168946A (en)Vehicle wireless communication system, vehicle control unit, and handheld equipment
US20180089919A1 (en)Vehicle communication system, vehicle-mounted device, and portable device
US9902369B2 (en)Apparatus and method for dual range detection in a vehicle
KR102225967B1 (en)Defense of a relay attack
WO2019095022A1 (en)Method and system for relay attack prevention
JP2017061790A (en) Key lock-in prevention device
JP5249180B2 (en) Electronic key system
WO2018070401A1 (en)Electronic key system
JP6894345B2 (en) Wireless communication system
JP2017112533A (en)Vehicle communication system, on-vehicle device, and portable device
JP6253004B1 (en) Electronic key system
US9047716B1 (en)System and method for two-way remote activation with adaptive protocol

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:GENERAL MOTORS CORPORATION, MICHIGAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PROEFKE, DAVID T.;UTTER, THOMAS E.;REEL/FRAME:016218/0251

Effective date:20050124

STCFInformation on status: patent grant

Free format text:PATENTED CASE

ASAssignment

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC., MICHIGAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL MOTORS CORPORATION;REEL/FRAME:022092/0886

Effective date:20050119

ASAssignment

Owner name:UNITED STATES DEPARTMENT OF THE TREASURY, DISTRICT

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:022201/0610

Effective date:20081231

Owner name:UNITED STATES DEPARTMENT OF THE TREASURY,DISTRICT

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:022201/0610

Effective date:20081231

ASAssignment

Owner name:CITICORP USA, INC. AS AGENT FOR BANK PRIORITY SECU

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:022553/0446

Effective date:20090409

Owner name:CITICORP USA, INC. AS AGENT FOR HEDGE PRIORITY SEC

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:022553/0446

Effective date:20090409

ASAssignment

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC., MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:UNITED STATES DEPARTMENT OF THE TREASURY;REEL/FRAME:023124/0429

Effective date:20090709

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC.,MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:UNITED STATES DEPARTMENT OF THE TREASURY;REEL/FRAME:023124/0429

Effective date:20090709

ASAssignment

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC., MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNORS:CITICORP USA, INC. AS AGENT FOR BANK PRIORITY SECURED PARTIES;CITICORP USA, INC. AS AGENT FOR HEDGE PRIORITY SECURED PARTIES;REEL/FRAME:023127/0468

Effective date:20090814

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC.,MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNORS:CITICORP USA, INC. AS AGENT FOR BANK PRIORITY SECURED PARTIES;CITICORP USA, INC. AS AGENT FOR HEDGE PRIORITY SECURED PARTIES;REEL/FRAME:023127/0468

Effective date:20090814

ASAssignment

Owner name:UNITED STATES DEPARTMENT OF THE TREASURY, DISTRICT

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:023156/0052

Effective date:20090710

Owner name:UNITED STATES DEPARTMENT OF THE TREASURY,DISTRICT

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:023156/0052

Effective date:20090710

ASAssignment

Owner name:UAW RETIREE MEDICAL BENEFITS TRUST, MICHIGAN

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:023162/0001

Effective date:20090710

Owner name:UAW RETIREE MEDICAL BENEFITS TRUST,MICHIGAN

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:023162/0001

Effective date:20090710

FPAYFee payment

Year of fee payment:4

ASAssignment

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC., MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:UNITED STATES DEPARTMENT OF THE TREASURY;REEL/FRAME:025245/0442

Effective date:20100420

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS, INC., MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:UAW RETIREE MEDICAL BENEFITS TRUST;REEL/FRAME:025311/0770

Effective date:20101026

ASAssignment

Owner name:WILMINGTON TRUST COMPANY, DELAWARE

Free format text:SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:025327/0001

Effective date:20101027

ASAssignment

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN

Free format text:CHANGE OF NAME;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS, INC.;REEL/FRAME:025780/0936

Effective date:20101202

FPAYFee payment

Year of fee payment:8

ASAssignment

Owner name:GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:034371/0676

Effective date:20141017

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553)

Year of fee payment:12


[8]ページ先頭

©2009-2025 Movatter.jp